| Publication | Date of Publication | Type |
|---|
Efficient universally-verifiable electronic voting with everlasting privacy | 2025-01-10 | Paper |
Attribute-based signatures with advanced delegation, and tracing | 2024-11-12 | Paper |
Verifiable decentralized multi-client functional encryption for inner product | 2024-09-13 | Paper |
Covercrypt: an efficient early-abort KEM for hidden access policies with traceability from the DDH and LWE | 2024-06-05 | Paper |
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data | 2024-03-14 | Paper |
Tracing a linear subspace: application to linearly-homomorphic group signatures Lecture Notes in Computer Science | 2023-11-24 | Paper |
GeT a CAKE: \underline{Ge}neric \underline{T}ransformations from \underline{K}ey encaspulation mechanisms to password \underline{A}uthenticated \underline{K}ey \underline{E}xchanges | 2023-11-10 | Paper |
Optimal security notion for decentralized multi-client functional encryption | 2023-11-10 | Paper |
Multi-client functional encryption with fine-grained access control Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
MyOPE: malicious security for oblivious polynomial evaluation Lecture Notes in Computer Science | 2023-07-25 | Paper |
Traceable constant-size multi-authority credentials Lecture Notes in Computer Science | 2023-07-25 | Paper |
Key-policy ABE with switchable attributes Lecture Notes in Computer Science | 2023-07-25 | Paper |
Traceable constant-size multi-authority credentials Information and Computation | 2023-07-17 | Paper |
Asymmetric Cryptography | 2023-03-29 | Paper |
Multi-client inner-product functional encryption in the random-oracle model | 2022-12-16 | Paper |
Dynamic decentralized functional encryption | 2022-11-09 | Paper |
Homomorphic-policy attribute-based key encapsulation mechanisms Lecture Notes in Computer Science | 2022-11-02 | Paper |
Robust password-protected secret sharing | 2022-08-19 | Paper |
Boosting verifiable computation on encrypted data | 2021-12-01 | Paper |
Linearly-homomorphic signatures and scalable mix-nets | 2021-12-01 | Paper |
Traceable inner product functional encryption | 2020-08-05 | Paper |
Divisible e-cash from constrained pseudo-random functions | 2020-05-20 | Paper |
Unbounded inner-product functional encryption with succinct keys | 2020-01-30 | Paper |
Reassessing security of randomizable signatures | 2020-01-21 | Paper |
On the tightness of forward-secure signature reductions Journal of Cryptology | 2019-01-29 | Paper |
Decentralized multi-client functional encryption for inner product | 2019-01-23 | Paper |
On the leakage of corrupted garbled circuits | 2018-11-07 | Paper |
Privacy-preserving plaintext-equality of low-entropy inputs | 2018-08-10 | Paper |
Fuzzy password-authenticated key exchange | 2018-07-17 | Paper |
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption Theoretical Computer Science | 2018-04-04 | Paper |
Cut down the tree to achieve constant complexity in divisible e-cash Lecture Notes in Computer Science | 2017-06-13 | Paper |
Removing erasures with explainable hash proof systems Lecture Notes in Computer Science | 2017-06-13 | Paper |
Encryption switching protocols Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
The whole is less than the sum of its parts: constructing more efficient lattice-based AKEs Lecture Notes in Computer Science | 2016-10-21 | Paper |
Legally Fair Contract Signing Without Keystones Applied Cryptography and Network Security | 2016-10-04 | Paper |
Short randomizable signatures Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
Robust pseudo-random number generators with input secure against side-channel attacks Applied Cryptography and Network Security | 2016-03-10 | Paper |
Scalable Divisible E-cash Applied Cryptography and Network Security | 2016-03-10 | Paper |
Practical multi-candidate election system Proceedings of the twentieth annual ACM symposium on Principles of distributed computing | 2016-03-04 | Paper |
Implicit zero-knowledge arguments and applications to the malicious setting Lecture Notes in Computer Science | 2015-12-10 | Paper |
Disjunctions for Hash Proof Systems: New Constructions and Applications Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Public-key encryption indistinguishable under plaintext-checkable attacks Lecture Notes in Computer Science | 2015-08-27 | Paper |
Divisible e-cash made practical Lecture Notes in Computer Science | 2015-08-27 | Paper |
Simple functional encryption schemes for inner products Lecture Notes in Computer Science | 2015-08-27 | Paper |
Forward secure non-interactive key exchange Lecture Notes in Computer Science | 2014-10-14 | Paper |
Dynamic fully anonymous short group signatures Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
Security proofs for signature schemes Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Analysis and improvement of Lindell's UC-secure commitment schemes Applied Cryptography and Network Security | 2014-01-24 | Paper |
SPHF-friendly non-interactive commitments Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Black-box Trace\&Revoke codes Algorithmica | 2013-11-11 | Paper |
New techniques for SPHFs and efficient one-round PAKE protocols Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Tighter Reductions for Forward-Secure Signature Schemes Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Decentralized dynamic broadcast encryption Lecture Notes in Computer Science | 2012-09-25 | Paper |
Compact Round-Optimal Partially-Blind Signatures Lecture Notes in Computer Science | 2012-09-25 | Paper |
Message-based traitor tracing with optimal ciphertext rate Progress in Cryptology – LATINCRYPT 2012 | 2012-09-21 | Paper |
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts Information Security and Privacy | 2012-09-07 | Paper |
Password-based authenticated key exchange Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Round-optimal privacy-preserving protocols with smooth projective hash functions Theory of Cryptography | 2012-06-15 | Paper |
Traceable Signature with Stepping Capabilities Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Autotomic signatures Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Security notions for broadcast encryption Applied Cryptography and Network Security | 2011-06-28 | Paper |
Parallel signcryption Practical Signcryption | 2011-05-18 | Paper |
Signatures on randomizable ciphertexts Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Contributory password-authenticated group key exchange with join capability Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
Mediated traceable anonymous encryption Lecture Notes in Computer Science | 2010-08-31 | Paper |
On some incompatible properties of voting schemes Towards Trustworthy Elections | 2010-06-17 | Paper |
Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Flexible group key exchange with on-demand computation of subgroup keys Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications Lecture Notes in Computer Science | 2010-01-05 | Paper |
Chosen-ciphertext security without redundancy Lecture Notes in Computer Science | 2010-01-05 | Paper |
Smooth Projective Hashing for Conditionally Extractable Commitments Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures Pairing-Based Cryptography – Pairing 2009 | 2009-08-18 | Paper |
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
New Anonymity Notions for Identity-Based Encryption Formal to Practical Security | 2009-06-09 | Paper |
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures Formal to Practical Security | 2009-06-09 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Optimal Randomness Extraction from a Diffie-Hellman Element Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Distributed Public-Key Cryptography from Weak Secrets Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication Information Security and Privacy | 2009-03-06 | Paper |
Dynamic Threshold Public-Key Encryption Lecture Notes in Computer Science | 2009-02-10 | Paper |
About the Security of MTI/C0 and MQV Lecture Notes in Computer Science | 2008-11-27 | Paper |
A New Key Exchange Protocol Based on MQV Assuming Public Computations Lecture Notes in Computer Science | 2008-11-27 | Paper |
New Anonymity Notions for Identity-Based Encryption Lecture Notes in Computer Science | 2008-11-20 | Paper |
Anonymous Proxy Signatures Lecture Notes in Computer Science | 2008-11-20 | Paper |
Public Traceability in Traitor Tracing Schemes Lecture Notes in Computer Science | 2008-05-06 | Paper |
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Extended Private Information Retrieval and Its Application in Biometrics Authentications Cryptology and Network Security | 2008-04-15 | Paper |
A Simple Threshold Authenticated Key Exchange from Short Secrets Lecture Notes in Computer Science | 2008-03-18 | Paper |
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys Pairing-Based Cryptography – Pairing 2007 | 2007-11-29 | Paper |
Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science | 2007-11-28 | Paper |
Optimal Asymmetric Encryption and Signature Paddings Applied Cryptography and Network Security | 2007-09-24 | Paper |
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes Automata, Languages and Programming | 2007-09-11 | Paper |
Automated Security Proofs with Sequences of Games Lecture Notes in Computer Science | 2007-09-04 | Paper |
Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication Journal of Cryptology | 2007-05-24 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2006-10-10 | Paper |
Provable security for public key schemes | 2006-09-25 | Paper |
Authenticated key exchange secure against dictionary attacks | 2006-03-01 | Paper |
Financial Cryptography and Data Security Lecture Notes in Computer Science | 2005-12-22 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Contemporary cryptology. Advanced Courses in Mathematics -- CRM Barcelona | 2005-08-30 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding | 2005-08-12 | Paper |
RSA-OAEP is secure under the RSA assumption Journal of Cryptology | 2004-09-27 | Paper |
scientific article; zbMATH DE number 2088323 (Why is no real title available?) | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2088330 (Why is no real title available?) | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2088331 (Why is no real title available?) | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2086715 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2085419 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 2081087 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2081072 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2081075 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2079933 (Why is no real title available?) | 2004-08-03 | Paper |
scientific article; zbMATH DE number 2043337 (Why is no real title available?) | 2004-02-16 | Paper |
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme Journal of Cryptology | 2003-08-27 | Paper |
scientific article; zbMATH DE number 1951620 (Why is no real title available?) | 2003-07-21 | Paper |
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks Lecture Notes in Computer Science | 2003-07-16 | Paper |
scientific article; zbMATH DE number 1942415 (Why is no real title available?) | 2003-06-30 | Paper |
scientific article; zbMATH DE number 1942422 (Why is no real title available?) | 2003-06-30 | Paper |
A new NP-complete problem and public-key identification Designs, Codes and Cryptography | 2003-04-03 | Paper |
scientific article; zbMATH DE number 1786488 (Why is no real title available?) | 2003-03-31 | Paper |
scientific article; zbMATH DE number 1759331 (Why is no real title available?) | 2003-03-07 | Paper |
scientific article; zbMATH DE number 1842496 (Why is no real title available?) | 2002-12-08 | Paper |
scientific article; zbMATH DE number 1759639 (Why is no real title available?) | 2002-11-24 | Paper |
scientific article; zbMATH DE number 1617922 (Why is no real title available?) | 2002-09-19 | Paper |
scientific article; zbMATH DE number 1617925 (Why is no real title available?) | 2002-09-01 | Paper |
scientific article; zbMATH DE number 1759358 (Why is no real title available?) | 2002-06-25 | Paper |
scientific article; zbMATH DE number 1618043 (Why is no real title available?) | 2002-05-05 | Paper |
scientific article; zbMATH DE number 1504547 (Why is no real title available?) | 2002-01-27 | Paper |
scientific article; zbMATH DE number 1670847 (Why is no real title available?) | 2001-12-09 | Paper |
scientific article; zbMATH DE number 1676653 (Why is no real title available?) | 2001-11-25 | Paper |
scientific article; zbMATH DE number 1440053 (Why is no real title available?) | 2000-08-28 | Paper |
Security arguments for digital signatures and blind signatures Journal of Cryptology | 2000-08-08 | Paper |
scientific article; zbMATH DE number 1440054 (Why is no real title available?) | 2000-05-07 | Paper |
scientific article; zbMATH DE number 1440063 (Why is no real title available?) | 2000-05-07 | Paper |
scientific article; zbMATH DE number 1304075 (Why is no real title available?) | 2000-04-09 | Paper |
scientific article; zbMATH DE number 1303137 (Why is no real title available?) | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1302836 (Why is no real title available?) | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1304109 (Why is no real title available?) | 1999-06-17 | Paper |